Experienced. Trusted. Dependable.

Our Approach

We use an offense security mindset to simulate your adversary and implement solutions and strategies that work.

Plan

We perform reconnaissance to discover vulnerabilities in personnel, processes, and technology.

Assess

We leverage exploitable vulnerabilities to move silently across the network and test implemented technologies.

Secure

We regroup after assessments to discuss findings along with remediation steps as a team.

Our Clients

Leap Security's client base has grown steadily since our launch thanks to word of mouth recommendations. Our succcess is based on our ability to customize assessments, be agile, and technical expertise. Our clients range from startups to Fortune 10 across all industries.

The Latest Posts

Leap Security CTF 2018

Welcome Welcome to the inaugural Leap Security CTF competition. The CTF is a global competition created with the goal of giving back to the community. To make this all happen, we’ve teamed up with the guys at 0x00sec! The CTF will have no limitations on participants, it is open to anyone — think of it…

libssh Authentication Bypass CVE-2018-10933

The Vulnerability A vulnerability present in libssh versions 0.6 and later has taken the internet by storm. The vulnerability allows attackers to bypass authentication and gain remote code execution on the affected system. The libssh team has already released a patch to this vulnerability (link below). Upgrading to 0.7.6 or 0.8.4 eliminates the vulnerability. Link:…

Let's talk about your security needs

Leap Security is dedicated to streamlining cyber security for organizations of all sizes. Our tailored security assessments demonstrate real world risk and help bridge the gap between executive and technical stakeholders. Our team is made up of respected information security veterans that are committed to improving security with our clients. Join us on a climb to a more secure future. Take the Leap with Leap Security.